*** This bug is a security vulnerability ***
Public security bug reported:
Upstream git commit 1957a85b0032 needs to be backported to older
releases:
efi: Restrict efivar_ssdt_load when the kernel is locked down
efivar_ssdt_load allows the kernel to import arbitrary ACPI code from an
EFI variable, which gives arbitrary code execution in ring 0. Prevent
that when the kernel is locked down.
Code introduced in 475fb4e8b2f4444d1d7b406ff3a7d21bc89a1e6f
break-fix: 475fb4e8b2f4444d1d7b406ff3a7d21bc89a1e6f
1957a85b0032a81e6482ca4aab883643b8dae06e
** Affects: linux (Ubuntu)
Importance: Undecided
Status: New
** Description changed:
Upstream git commit 1957a85b0032 needs to be backported to older
releases:
- efi: Restrict efivar_ssdt_load when the kernel is locked down
+ efi: Restrict efivar_ssdt_load when the kernel is locked down
- efivar_ssdt_load allows the kernel to import arbitrary ACPI code from an
- EFI variable, which gives arbitrary code execution in ring 0. Prevent
- that when the kernel is locked down.
+ efivar_ssdt_load allows the kernel to import arbitrary ACPI code from an
+ EFI variable, which gives arbitrary code execution in ring 0. Prevent
+ that when the kernel is locked down.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1883598
Title:
efi: Restrict efivar_ssdt_load when the kernel is locked down
Status in linux package in Ubuntu:
New
Bug description:
Upstream git commit 1957a85b0032 needs to be backported to older
releases:
efi: Restrict efivar_ssdt_load when the kernel is locked down
efivar_ssdt_load allows the kernel to import arbitrary ACPI code from an
EFI variable, which gives arbitrary code execution in ring 0. Prevent
that when the kernel is locked down.
Code introduced in 475fb4e8b2f4444d1d7b406ff3a7d21bc89a1e6f
break-fix: 475fb4e8b2f4444d1d7b406ff3a7d21bc89a1e6f
1957a85b0032a81e6482ca4aab883643b8dae06e
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1883598/+subscriptions
--
Mailing list: https://launchpad.net/~kernel-packages
Post to : [email protected]
Unsubscribe : https://launchpad.net/~kernel-packages
More help : https://help.launchpad.net/ListHelp